mirror of https://github.com/OISF/suricata
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
576 lines
16 KiB
C
576 lines
16 KiB
C
/* Copyright (C) 2007-2010 Open Information Security Foundation
|
|
*
|
|
* You can copy, redistribute or modify this Program under the terms of
|
|
* the GNU General Public License version 2 as published by the Free
|
|
* Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* version 2 along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
|
* 02110-1301, USA.
|
|
*/
|
|
|
|
/**
|
|
* \file
|
|
*
|
|
* \author Pablo Rincon <pablo.rincon.crespo@gmail.com>
|
|
*
|
|
* ftpbounce keyword, part of the detection engine.
|
|
*/
|
|
|
|
#include "suricata-common.h"
|
|
#include "debug.h"
|
|
#include "decode.h"
|
|
#include "detect.h"
|
|
#include "detect-parse.h"
|
|
#include "detect-engine.h"
|
|
#include "detect-engine-mpm.h"
|
|
#include "detect-engine-state.h"
|
|
#include "detect-content.h"
|
|
|
|
#include "app-layer.h"
|
|
#include "app-layer-parser.h"
|
|
#include "app-layer-ftp.h"
|
|
#include "util-unittest.h"
|
|
#include "util-unittest-helper.h"
|
|
#include "util-debug.h"
|
|
#include "flow.h"
|
|
#include "flow-var.h"
|
|
#include "flow-util.h"
|
|
#include "threads.h"
|
|
#include "detect-ftpbounce.h"
|
|
#include "stream-tcp.h"
|
|
#include "util-byte.h"
|
|
|
|
static int DetectFtpbounceALMatch(DetectEngineThreadCtx *,
|
|
Flow *, uint8_t, void *, void *,
|
|
const Signature *, const SigMatchCtx *);
|
|
|
|
static int DetectFtpbounceSetup(DetectEngineCtx *, Signature *, const char *);
|
|
static void DetectFtpbounceRegisterTests(void);
|
|
static int g_ftp_request_list_id = 0;
|
|
|
|
static int InspectFtpRequest(ThreadVars *tv,
|
|
DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx,
|
|
const Signature *s, const SigMatchData *smd,
|
|
Flow *f, uint8_t flags, void *alstate,
|
|
void *txv, uint64_t tx_id);
|
|
|
|
/**
|
|
* \brief Registration function for ftpbounce: keyword
|
|
* \todo add support for no_stream and stream_only
|
|
*/
|
|
void DetectFtpbounceRegister(void)
|
|
{
|
|
sigmatch_table[DETECT_FTPBOUNCE].name = "ftpbounce";
|
|
sigmatch_table[DETECT_FTPBOUNCE].desc = "detect FTP bounce attacks";
|
|
sigmatch_table[DETECT_FTPBOUNCE].Setup = DetectFtpbounceSetup;
|
|
sigmatch_table[DETECT_FTPBOUNCE].AppLayerTxMatch = DetectFtpbounceALMatch;
|
|
sigmatch_table[DETECT_FTPBOUNCE].RegisterTests = DetectFtpbounceRegisterTests;
|
|
sigmatch_table[DETECT_FTPBOUNCE].url = DOC_URL DOC_VERSION "/rules/ftp-keywords.html#ftpbounce";
|
|
sigmatch_table[DETECT_FTPBOUNCE].flags = SIGMATCH_NOOPT;
|
|
|
|
g_ftp_request_list_id = DetectBufferTypeRegister("ftp_request");
|
|
|
|
DetectAppLayerInspectEngineRegister("ftp_request",
|
|
ALPROTO_FTP, SIG_FLAG_TOSERVER, 0,
|
|
InspectFtpRequest);
|
|
}
|
|
|
|
static int InspectFtpRequest(ThreadVars *tv,
|
|
DetectEngineCtx *de_ctx, DetectEngineThreadCtx *det_ctx,
|
|
const Signature *s, const SigMatchData *smd,
|
|
Flow *f, uint8_t flags, void *alstate,
|
|
void *txv, uint64_t tx_id)
|
|
{
|
|
return DetectEngineInspectGenericList(tv, de_ctx, det_ctx, s, smd,
|
|
f, flags, alstate, txv, tx_id);
|
|
}
|
|
|
|
/**
|
|
* \brief This function is used to match ftpbounce attacks
|
|
*
|
|
* \param payload Payload of the PORT command
|
|
* \param payload_len Length of the payload
|
|
* \param ip_orig IP source to check the ftpbounce condition
|
|
* \param offset offset to the arguments of the PORT command
|
|
*
|
|
* \retval 1 if ftpbounce detected, 0 if not
|
|
*/
|
|
static int DetectFtpbounceMatchArgs(uint8_t *payload, uint16_t payload_len,
|
|
uint32_t ip_orig, uint16_t offset)
|
|
{
|
|
SCEnter();
|
|
SCLogDebug("Checking ftpbounce condition");
|
|
char *c = NULL;
|
|
uint16_t i = 0;
|
|
int octet = 0;
|
|
int octet_ascii_len = 0;
|
|
int noctet = 0;
|
|
uint32_t ip = 0;
|
|
/* PrintRawDataFp(stdout, payload, payload_len); */
|
|
|
|
if (payload_len < 7) {
|
|
/* we need at least a differet ip address
|
|
* in the format 1,2,3,4,x,y where x,y is the port
|
|
* in two byte representation so let's look at
|
|
* least for the IP octets in comma separated */
|
|
return 0;
|
|
}
|
|
|
|
if (offset + 7 >= payload_len)
|
|
return 0;
|
|
|
|
c =(char*) payload;
|
|
if (c == NULL) {
|
|
SCLogDebug("No payload to check");
|
|
return 0;
|
|
}
|
|
|
|
i = offset;
|
|
/* Search for the first IP octect(Skips "PORT ") */
|
|
while (i < payload_len && !isdigit((unsigned char)c[i])) i++;
|
|
|
|
for (;i < payload_len && octet_ascii_len < 4 ;i++) {
|
|
if (isdigit((unsigned char)c[i])) {
|
|
octet =(c[i] - '0') + octet * 10;
|
|
octet_ascii_len++;
|
|
} else {
|
|
if (octet > 256) {
|
|
SCLogDebug("Octet not in ip format");
|
|
return 0;
|
|
}
|
|
|
|
if (isspace((unsigned char)c[i]))
|
|
while (i < payload_len && isspace((unsigned char)c[i]) ) i++;
|
|
|
|
if (i < payload_len && c[i] == ',') { /* we have an octet */
|
|
noctet++;
|
|
octet_ascii_len = 0;
|
|
ip =(ip << 8) + octet;
|
|
octet = 0;
|
|
} else {
|
|
SCLogDebug("Unrecognized character '%c'", c[i]);
|
|
return 0;
|
|
}
|
|
if (noctet == 4) {
|
|
/* Different IP than src, ftp bounce scan */
|
|
ip = SCByteSwap32(ip);
|
|
|
|
if (ip != ip_orig) {
|
|
SCLogDebug("Different ip, so Matched ip:%d <-> ip_orig:%d",
|
|
ip, ip_orig);
|
|
return 1;
|
|
}
|
|
SCLogDebug("Same ip, so no match here");
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
SCLogDebug("No match");
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* \brief This function is used to check matches from the FTP App Layer Parser
|
|
*
|
|
* \param t pointer to thread vars
|
|
* \param det_ctx pointer to the pattern matcher thread
|
|
* \param p pointer to the current packet
|
|
* \param m pointer to the sigmatch but we don't use it since ftpbounce
|
|
* has no options
|
|
* \retval 0 no match
|
|
* \retval 1 match
|
|
*/
|
|
static int DetectFtpbounceALMatch(DetectEngineThreadCtx *det_ctx,
|
|
Flow *f, uint8_t flags,
|
|
void *state, void *txv,
|
|
const Signature *s, const SigMatchCtx *m)
|
|
{
|
|
SCEnter();
|
|
|
|
FtpState *ftp_state = (FtpState *)state;
|
|
if (ftp_state == NULL) {
|
|
SCLogDebug("no ftp state, no match");
|
|
SCReturnInt(0);
|
|
}
|
|
|
|
int ret = 0;
|
|
if (ftp_state->command == FTP_COMMAND_PORT) {
|
|
ret = DetectFtpbounceMatchArgs(ftp_state->port_line,
|
|
ftp_state->port_line_len, f->src.address.address_un_data32[0],
|
|
ftp_state->arg_offset);
|
|
}
|
|
|
|
SCReturnInt(ret);
|
|
}
|
|
|
|
/**
|
|
* \brief this function is used to add the parsed ftpbounce
|
|
*
|
|
* \param de_ctx pointer to the Detection Engine Context
|
|
* \param s pointer to the Current Signature
|
|
* \param m pointer to the Current SigMatch
|
|
* \param ftpbouncestr pointer to the user provided ftpbounce options
|
|
* currently there are no options.
|
|
*
|
|
* \retval 0 on Success
|
|
* \retval -1 on Failure
|
|
*/
|
|
int DetectFtpbounceSetup(DetectEngineCtx *de_ctx, Signature *s, const char *ftpbouncestr)
|
|
{
|
|
SCEnter();
|
|
|
|
SigMatch *sm = NULL;
|
|
|
|
if (DetectSignatureSetAppProto(s, ALPROTO_FTP) != 0)
|
|
return -1;
|
|
|
|
sm = SigMatchAlloc();
|
|
if (sm == NULL) {
|
|
return -1;
|
|
}
|
|
|
|
sm->type = DETECT_FTPBOUNCE;
|
|
|
|
/* We don't need to allocate any data for ftpbounce here.
|
|
*
|
|
* TODO: As a suggestion, maybe we can add a flag in the flow
|
|
* to set the stream as "bounce detected" for fast Match.
|
|
* When you do a ftp bounce attack you usually use the same
|
|
* communication control stream to "setup" various destinations
|
|
* whithout breaking the connection, so I guess we can make it a bit faster
|
|
* with a flow flag set lookup in the Match function.
|
|
*/
|
|
sm->ctx = NULL;
|
|
|
|
SigMatchAppendSMToList(s, sm, g_ftp_request_list_id);
|
|
SCReturnInt(0);
|
|
}
|
|
|
|
#ifdef UNITTESTS
|
|
|
|
/**
|
|
* \test DetectFtpbounceTestSetup01 is a test for the Setup ftpbounce
|
|
*/
|
|
static int DetectFtpbounceTestSetup01(void)
|
|
{
|
|
DetectEngineCtx *de_ctx = NULL;
|
|
Signature *s = SigAlloc();
|
|
FAIL_IF (s == NULL);
|
|
|
|
/* ftpbounce doesn't accept options so the str is NULL */
|
|
FAIL_IF_NOT(DetectFtpbounceSetup(de_ctx, s, NULL) == 0);
|
|
FAIL_IF(s->sm_lists[g_ftp_request_list_id] == NULL);
|
|
FAIL_IF_NOT(s->sm_lists[g_ftp_request_list_id]->type & DETECT_FTPBOUNCE);
|
|
|
|
SigFree(de_ctx, s);
|
|
PASS;
|
|
}
|
|
|
|
#include "stream-tcp-reassemble.h"
|
|
|
|
/**
|
|
* \test Check the ftpbounce match, send a get request in three chunks
|
|
* + more data.
|
|
* \brief This test tests the ftpbounce condition match, based on the
|
|
* ftp layer parser
|
|
*/
|
|
static int DetectFtpbounceTestALMatch02(void)
|
|
{
|
|
int result = 0;
|
|
|
|
uint8_t ftpbuf1[] = { 'P','O' };
|
|
uint32_t ftplen1 = sizeof(ftpbuf1);
|
|
uint8_t ftpbuf2[] = { 'R', 'T' };
|
|
uint32_t ftplen2 = sizeof(ftpbuf2);
|
|
uint8_t ftpbuf3[] = { ' ', '8','0',',','5' };
|
|
uint32_t ftplen3 = sizeof(ftpbuf3);
|
|
uint8_t ftpbuf4[] = "8,0,33,10,20\r\n";
|
|
uint32_t ftplen4 = sizeof(ftpbuf4);
|
|
|
|
TcpSession ssn;
|
|
Flow f;
|
|
Packet *p = NULL;
|
|
Signature *s = NULL;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p = UTHBuildPacketSrcDst(NULL, 0, IPPROTO_TCP, "1.2.3.4", "5.6.7.8");
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.src.address.address_un_data32[0]=0x01020304;
|
|
f.protoctx =(void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
|
|
p->flow = &f;
|
|
p->flowflags |= FLOW_PKT_TOSERVER;
|
|
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_FTP;
|
|
|
|
StreamTcpInitConfig(TRUE);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
if (de_ctx == NULL) {
|
|
goto end;
|
|
}
|
|
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
s = de_ctx->sig_list = SigInit(de_ctx,"alert tcp any any -> any any "
|
|
"(msg:\"Ftp Bounce\"; ftpbounce; sid:1;)");
|
|
if (s == NULL) {
|
|
goto end;
|
|
}
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v,(void *)de_ctx,(void *)&det_ctx);
|
|
|
|
FLOWLOCK_WRLOCK(&f);
|
|
int r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP,
|
|
STREAM_TOSERVER, ftpbuf1, ftplen1);
|
|
if (r != 0) {
|
|
SCLogDebug("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
|
|
result = 0;
|
|
FLOWLOCK_UNLOCK(&f);
|
|
goto end;
|
|
}
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
|
|
ftpbuf2, ftplen2);
|
|
if (r != 0) {
|
|
SCLogDebug("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
|
|
result = 0;
|
|
FLOWLOCK_UNLOCK(&f);
|
|
goto end;
|
|
}
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
|
|
ftpbuf3, ftplen3);
|
|
if (r != 0) {
|
|
SCLogDebug("toserver chunk 3 returned %" PRId32 ", expected 0: ", r);
|
|
result = 0;
|
|
FLOWLOCK_UNLOCK(&f);
|
|
goto end;
|
|
}
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
|
|
ftpbuf4, ftplen4);
|
|
if (r != 0) {
|
|
SCLogDebug("toserver chunk 4 returned %" PRId32 ", expected 0: ", r);
|
|
result = 0;
|
|
FLOWLOCK_UNLOCK(&f);
|
|
goto end;
|
|
}
|
|
|
|
FLOWLOCK_UNLOCK(&f);
|
|
|
|
FtpState *ftp_state = f.alstate;
|
|
if (ftp_state == NULL) {
|
|
SCLogDebug("no ftp state: ");
|
|
result = 0;
|
|
goto end;
|
|
}
|
|
|
|
if (ftp_state->command != FTP_COMMAND_PORT) {
|
|
SCLogDebug("expected command port not detected");
|
|
result = 0;
|
|
goto end;
|
|
}
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
|
|
if (!(PacketAlertCheck(p, 1))) {
|
|
goto end;
|
|
}
|
|
|
|
result = 1;
|
|
end:
|
|
if (alp_tctx != NULL)
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
SigGroupCleanup(de_ctx);
|
|
SigCleanSignatures(de_ctx);
|
|
|
|
DetectEngineThreadCtxDeinit(&th_v,(void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
|
|
StreamTcpFreeConfig(TRUE);
|
|
FLOW_DESTROY(&f);
|
|
|
|
UTHFreePackets(&p, 1);
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* \test Check the ftpbounce match
|
|
* \brief This test tests the ftpbounce condition match, based on
|
|
* the ftp layer parser
|
|
*/
|
|
static int DetectFtpbounceTestALMatch03(void)
|
|
{
|
|
int result = 0;
|
|
|
|
uint8_t ftpbuf1[] = { 'P','O' };
|
|
uint32_t ftplen1 = sizeof(ftpbuf1);
|
|
uint8_t ftpbuf2[] = { 'R', 'T' };
|
|
uint32_t ftplen2 = sizeof(ftpbuf2);
|
|
uint8_t ftpbuf3[] = { ' ', '1',',','2',',' };
|
|
uint32_t ftplen3 = sizeof(ftpbuf3);
|
|
uint8_t ftpbuf4[] = "3,4,10,20\r\n";
|
|
uint32_t ftplen4 = sizeof(ftpbuf4);
|
|
|
|
TcpSession ssn;
|
|
Flow f;
|
|
Packet *p = SCMalloc(SIZE_OF_PACKET);
|
|
if (unlikely(p == NULL))
|
|
return 0;
|
|
Signature *s = NULL;
|
|
ThreadVars th_v;
|
|
DetectEngineThreadCtx *det_ctx = NULL;
|
|
AppLayerParserThreadCtx *alp_tctx = AppLayerParserThreadCtxAlloc();
|
|
|
|
memset(&th_v, 0, sizeof(th_v));
|
|
memset(p, 0, SIZE_OF_PACKET);
|
|
memset(&f, 0, sizeof(f));
|
|
memset(&ssn, 0, sizeof(ssn));
|
|
|
|
p->src.family = AF_INET;
|
|
p->dst.family = AF_INET;
|
|
p->src.addr_data32[0] = 0x04030201;
|
|
p->payload = NULL;
|
|
p->payload_len = 0;
|
|
p->proto = IPPROTO_TCP;
|
|
|
|
FLOW_INITIALIZE(&f);
|
|
f.src.address.address_un_data32[0]=0x04030201;
|
|
f.protoctx =(void *)&ssn;
|
|
f.proto = IPPROTO_TCP;
|
|
|
|
p->flow = &f;
|
|
p->flowflags |= FLOW_PKT_TOSERVER;
|
|
p->flowflags |= FLOW_PKT_ESTABLISHED;
|
|
p->flags |= PKT_HAS_FLOW|PKT_STREAM_EST;
|
|
f.alproto = ALPROTO_FTP;
|
|
|
|
StreamTcpInitConfig(TRUE);
|
|
|
|
DetectEngineCtx *de_ctx = DetectEngineCtxInit();
|
|
if (de_ctx == NULL) {
|
|
goto end;
|
|
}
|
|
|
|
de_ctx->flags |= DE_QUIET;
|
|
|
|
s = de_ctx->sig_list = SigInit(de_ctx,"alert tcp any any -> any any "
|
|
"(msg:\"Ftp Bounce\"; ftpbounce; sid:1;)");
|
|
if (s == NULL) {
|
|
goto end;
|
|
}
|
|
|
|
SigGroupBuild(de_ctx);
|
|
DetectEngineThreadCtxInit(&th_v,(void *)de_ctx,(void *)&det_ctx);
|
|
|
|
FLOWLOCK_WRLOCK(&f);
|
|
int r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP,
|
|
STREAM_TOSERVER, ftpbuf1, ftplen1);
|
|
if (r != 0) {
|
|
SCLogDebug("toserver chunk 1 returned %" PRId32 ", expected 0: ", r);
|
|
result = 0;
|
|
FLOWLOCK_UNLOCK(&f);
|
|
goto end;
|
|
}
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
|
|
ftpbuf2, ftplen2);
|
|
if (r != 0) {
|
|
SCLogDebug("toserver chunk 2 returned %" PRId32 ", expected 0: ", r);
|
|
result = 0;
|
|
FLOWLOCK_UNLOCK(&f);
|
|
goto end;
|
|
}
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
|
|
ftpbuf3, ftplen3);
|
|
if (r != 0) {
|
|
SCLogDebug("toserver chunk 3 returned %" PRId32 ", expected 0: ", r);
|
|
result = 0;
|
|
FLOWLOCK_UNLOCK(&f);
|
|
goto end;
|
|
}
|
|
|
|
r = AppLayerParserParse(NULL, alp_tctx, &f, ALPROTO_FTP, STREAM_TOSERVER,
|
|
ftpbuf4, ftplen4);
|
|
if (r != 0) {
|
|
SCLogDebug("toserver chunk 4 returned %" PRId32 ", expected 0: ", r);
|
|
result = 0;
|
|
FLOWLOCK_UNLOCK(&f);
|
|
goto end;
|
|
}
|
|
FLOWLOCK_UNLOCK(&f);
|
|
|
|
FtpState *ftp_state = f.alstate;
|
|
if (ftp_state == NULL) {
|
|
SCLogDebug("no ftp state: ");
|
|
result = 0;
|
|
goto end;
|
|
}
|
|
|
|
if (ftp_state->command != FTP_COMMAND_PORT) {
|
|
SCLogDebug("expected command port not detected");
|
|
result = 0;
|
|
goto end;
|
|
}
|
|
|
|
/* do detect */
|
|
SigMatchSignatures(&th_v, de_ctx, det_ctx, p);
|
|
|
|
/* It should not match */
|
|
if (!(PacketAlertCheck(p, 1))) {
|
|
result = 1;
|
|
} else {
|
|
SCLogDebug("It should not match here!");
|
|
}
|
|
|
|
end:
|
|
if (alp_tctx != NULL)
|
|
AppLayerParserThreadCtxFree(alp_tctx);
|
|
SigGroupCleanup(de_ctx);
|
|
SigCleanSignatures(de_ctx);
|
|
|
|
DetectEngineThreadCtxDeinit(&th_v,(void *)det_ctx);
|
|
DetectEngineCtxFree(de_ctx);
|
|
|
|
StreamTcpFreeConfig(TRUE);
|
|
FLOW_DESTROY(&f);
|
|
SCFree(p);
|
|
return result;
|
|
}
|
|
|
|
#endif /* UNITTESTS */
|
|
|
|
/**
|
|
* \brief this function registers unit tests for DetectFtpbounce
|
|
*/
|
|
void DetectFtpbounceRegisterTests(void)
|
|
{
|
|
#ifdef UNITTESTS
|
|
UtRegisterTest("DetectFtpbounceTestSetup01", DetectFtpbounceTestSetup01);
|
|
UtRegisterTest("DetectFtpbounceTestALMatch02",
|
|
DetectFtpbounceTestALMatch02);
|
|
UtRegisterTest("DetectFtpbounceTestALMatch03",
|
|
DetectFtpbounceTestALMatch03);
|
|
#endif /* UNITTESTS */
|
|
}
|